Search Header Logo

Cyber Security Vocabulary Review

Authored by Stephanie Smith

Other

Professional Development

Used 18+ times

Cyber Security Vocabulary Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber Security can be defined as

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

All of the above

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multi-factor Authentication (MFA or 2FA)

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?